Read Ahead | Cover6 Solutions Workshops
This guide prepares you for our #Intro2Cyber & #SOCAnalystPrep
hands-on cybersecurity training.
First, we want to thank you for your interest in Cover6 Solutions. If you made it this far, you have most likely registered for one of our workshops. For that, we are forever grateful, and you will always be considered family to us.
This material summarizes the workshops, the hardware and software requirements, helpful videos, and educational references to help you better understand the class content.
Use the tabs below to view the material for your desired workshop.
EC-Council’s Essentials Series is the first MOOC certification course covering essential network defense skills, ethical hacking, and digital forensics. The Network Defense Essentials (N|DE), Ethical Hacking Essentials (E|HE), and Digital Forensics Essentials (D|FE) are foundational programs that help students, and early career professionals choose their area of competency or select a specific interest in cybersecurity.
The Essentials Series was designed to give students the foundation to build and develop the essential skills for tomorrow’s careers in cybersecurity. These programs teach learners various techniques across industry verticals, such as securing networks, mitigating cyber risks, conducting forensic investigations, and more.
Today the demand for cybersecurity professionals has never been higher, and the need for skilled defensive (blue team) analysts is especially urgent. At Cover6 we will provide the training you need to find your place in cyber. We focus on the fundamentals of network defense through real-world, hands-on instruction, and our workshop will offer you a path to a successful career as a Security Operations Center (SOC) Analyst.
SOC Analysts are highly sought-after professionals who identify compromised machines and respond to malicious activity. They use defensive security skills and techniques while working to mitigate any damage that may have occurred.
Our Virtual SOC Analyst Prep Workshop offers a comprehensive introduction to defensive tactics, techniques, and procedures. Students will learn various strategies to help defend against several attack scenarios.
A few of the tools and technologies that participants will explore include; Security Onion, Wireshark, Splunk, and Nessus. Also, our course is designed to help you prepare for the CySA+ exam and reflects the current exam objectives.
In this workshop students will:
- Analyze .pcap files and logs to identify Indicators of Compromise (IOC’s)
- Perform various incident handling and response procedures
- Use tools to implement initial threat hunting techniques
- Be prepared to work in a SOC on day 1
Breaking into Cybersecurity w/ Tyrone E. Wilson
Home Lab Setup | Building an Effective Cybersecurity Learning Environment
Passive Information Gathering
Common Network Services, Threats & Attacks
Active Information Gathering
IPv6 Enumeration & Attacks
Understanding the Metasploit Database
Incident Handling & Threat Hunting w/ Security Onion: Gain Hands-On Cybersecurity Experience
You can check out the following references to gain familiarity with terms and topics you will hear in class.